Veritas VCS-278 Question Answer
Which two options are determined by the Security Level? (Choose two.)
if the CA fingerprint needs to be confirmed during an installation or upgrade
if a host requires a token during installation
the idle log off timeout for the NetBackup Administration Console
whether insecure communication with NetBackup 8.0 and earlier hosts is allowed
how often CRLs are updated
TESTED 07 Jan 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved